World anti-virus. "A brief guide to anti-virus and anti-trojan programs.

"The world of anti-virus." A short guide to anti-virus and anti-trojan programs. A brief description of more than 40 tools are widely known and...
Specialist 0

Hacker magazine №20

Full off-laynevy Haker№20 magazine, there is everything

Security policy while working in Internet - a technical manual.

This book is designed to help an organization create a coherent Security Policy for the Internet. It provides a brief overview Internet and its protocols. It...
 1 DigmasOG 0

Large directory of computer viruses

Large directory of computer viruses
 3 shtut 0

Protection of information in automated data processing systems

Information protection in automated data processing systems. Some questions of legal support, licensing and certification in the field of information...
 2 shtut 0


Programa serves to prohibit loading Win9x. Not designed for experienced users and children, so it can not be used in order to save important information. When...
SoWo 0

Secrets of the hacker (2 books)

This guide "Secrets of a hacker" consists of two books, "Secrets of Super hacker" and "Hackers, crackers, and other information the...
 2 Purple Motion 0

Security. Protection against viruses and hackers. Security through its own registry.

Contents: Introduction to the Internet and security therein 1.1. Internet 1.2 Overview of the internal structure of TCP / IP 1.3 Issues related to security...
 1  2 jokl 0

How to write a computer virus

Introduction 5 PART 1. COM - VIRUSES 6 CHAPTER 1. DEVELOPMENT OF NON-RESIDENT Virus programs 6 1.1 Download and run COM - Programme 6 1.2 How the...
 1  13 jokl 0

B e s o p and with n o s t s W indows in the I nternet What do you much to fear

B e s o p and with n o s t s W indows in the I nternet What do you much to fear
Dienexxx 0

60 Articles for the hacker.

Здесь собрано более 60 статей по хакингу. Взлом, софт, описания, советы. Это стоит тех денег, которые запрошены, т.к. эта коллекция собиралась пару лет. И не...
 2 TIA 0

Restoring data on your hard drive

What you will find in this book? For information on how to recover lost data, such as accidental or intentional formatting a disk; how to look for and treat a...
 3 BookIzdat 0

Fundamentals of Information Security

It is a theoretical course on information security for beginners in this area and just curious people. This file contains the basic concepts, requirements...
 4 Pincod 0

Unique Book Kevin Mitnick

Очень интересная книга по искусству обмана. Написанная самым известным хакером Кевином Митником. Если ты хочешь стать настоящим хакером то обязательно прочитай!
 1  5 staffer 0

An elementary guide CRC_algoritmam error detection

Everything you wanted to know about CRC_algoritmah, but were afraid to ask for fear that errors of your knowledge can be found This article focuses on the...
 1  3 e_shop 0


This document provides an overview of techniques that are required for administrator lyu¬bogo Linux-system. It is described as a general philosophy...
 1  7 e_shop 0

Description Protocol ABG, data transmission bank termin

ABG protocol used to authenticate credit card customers in trade organizations, the service sector, as well as ATMs. The information is very valuable for...
 3 OnLine SRV 0

Two well-known books on computer security and Internet attacks Attack on Internet

Two of the most famous books on computer security: "Attack of the Internet" and "The attack on the Internet." One price for two books.
 1 Leon 0

Territory Internet Fraud All of the most popular methods of fraud in the Internet

Самые популярные способы обмана: Free GSM, порно-сайты, кардинг и многое другое. Конкретные примеры с подробным описанием и разоблачением. off - line версии...
 2 IntelFort 0

Illustrated tutorial on developing security

The development of the Internet is pushing the organization to expand their networks. This helps to attract new customers and build relationships with them on...
 1 неизвестная 0

Game Accounts